Detection of design flaws in the android permission protocol through bounded verification

32Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restrictions on the operations that each application can perform. In this paper, we perform an analysis of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential flaws in the protocol. A study of real-world Android applications corroborates our finding that the flaws in the Android permission protocol can have severe security implications, in some cases allowing the attacker to bypass the permission checks entirely.

Cite

CITATION STYLE

APA

Bagheri, H., Kang, E., Malek, S., & Jackson, D. (2015). Detection of design flaws in the android permission protocol through bounded verification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9109, pp. 73–89). Springer Verlag. https://doi.org/10.1007/978-3-319-19249-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free